<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Access to inside network from second vlan in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/access-to-inside-network-from-second-vlan/m-p/1182060#M875863</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Actually just thinking about it another possible solution would be:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Move the inside interface into it's own interface.  Then create a sub-interface and tag it with a vlan id.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On your switch either make the physical port conneecting to the ASA a trunk port or.......have it as a normal switch port in the inside VLAN, then if your switch supports it use the AUX vlan for your DMZ.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&amp;gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 27 Feb 2009 15:58:51 GMT</pubDate>
    <dc:creator>andrew.prince</dc:creator>
    <dc:date>2009-02-27T15:58:51Z</dc:date>
    <item>
      <title>Access to inside network from second vlan</title>
      <link>https://community.cisco.com/t5/network-security/access-to-inside-network-from-second-vlan/m-p/1182047#M875794</link>
      <description>&lt;P&gt;I placed a network 10.71.180.128/25 (VLAN71) behind the inside interface of my ASA5505. I have a server on this network that i have to access from both the internet and from inside my network.  I understand i can create a NAT rule to access the inside server from the internet, but have not been able to figure out how I can have computer (10.100.10.1) in other internal subnet 10.100.10.0/28 access server 10.71.180.140.  I only have basic package on ASA5505.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Help please.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 14:56:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-to-inside-network-from-second-vlan/m-p/1182047#M875794</guid>
      <dc:creator>michael.m.williams</dc:creator>
      <dc:date>2019-03-11T14:56:16Z</dc:date>
    </item>
    <item>
      <title>Re: Access to inside network from second vlan</title>
      <link>https://community.cisco.com/t5/network-security/access-to-inside-network-from-second-vlan/m-p/1182048#M875805</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mike,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How are you "routing" to the VLAN? Thru a layer 3 device?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Feb 2009 16:56:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-to-inside-network-from-second-vlan/m-p/1182048#M875805</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2009-02-24T16:56:59Z</dc:date>
    </item>
    <item>
      <title>Re: Access to inside network from second vlan</title>
      <link>https://community.cisco.com/t5/network-security/access-to-inside-network-from-second-vlan/m-p/1182049#M875809</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, I have a flat network and all routing is done by my core 6513.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Feb 2009 16:59:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-to-inside-network-from-second-vlan/m-p/1182049#M875809</guid>
      <dc:creator>michael.m.williams</dc:creator>
      <dc:date>2009-02-24T16:59:41Z</dc:date>
    </item>
    <item>
      <title>Re: Access to inside network from second vlan</title>
      <link>https://community.cisco.com/t5/network-security/access-to-inside-network-from-second-vlan/m-p/1182050#M875823</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So I take it that you have 2 SVI interfaces one in  10.100.10.0/28 and the other in 10.71.180.128/25 ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Feb 2009 17:03:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-to-inside-network-from-second-vlan/m-p/1182050#M875823</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2009-02-24T17:03:31Z</dc:date>
    </item>
    <item>
      <title>Re: Access to inside network from second vlan</title>
      <link>https://community.cisco.com/t5/network-security/access-to-inside-network-from-second-vlan/m-p/1182051#M875831</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes here is my config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Feb 2009 17:14:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-to-inside-network-from-second-vlan/m-p/1182051#M875831</guid>
      <dc:creator>michael.m.williams</dc:creator>
      <dc:date>2009-02-24T17:14:34Z</dc:date>
    </item>
    <item>
      <title>Re: Access to inside network from second vlan</title>
      <link>https://community.cisco.com/t5/network-security/access-to-inside-network-from-second-vlan/m-p/1182052#M875839</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mike,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have a 6513 that is performing IP routing, why are you not just routing between the 2 SVI interfaces in the 6513??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have a specific requirement to put vlan 71 and vlan 100 behind a firewall to protect them from each other?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Feb 2009 17:19:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-to-inside-network-from-second-vlan/m-p/1182052#M875839</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2009-02-24T17:19:44Z</dc:date>
    </item>
    <item>
      <title>Re: Access to inside network from second vlan</title>
      <link>https://community.cisco.com/t5/network-security/access-to-inside-network-from-second-vlan/m-p/1182053#M875846</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The way we structure our PCI compliance networks is to place them behind an ASA.  VLAN71 is the network that needs to be isolated, but I have a server in VLAN that exchanges information with one of the server in VLAN71.  Vender needs to come in from outside to mange the server in VLAN71&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Feb 2009 21:10:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-to-inside-network-from-second-vlan/m-p/1182053#M875846</guid>
      <dc:creator>michael.m.williams</dc:creator>
      <dc:date>2009-02-24T21:10:26Z</dc:date>
    </item>
    <item>
      <title>Re: Access to inside network from second vlan</title>
      <link>https://community.cisco.com/t5/network-security/access-to-inside-network-from-second-vlan/m-p/1182054#M875854</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK - firstly from the config you posted, the interface in VLAN100 E0/4 is shutdown, you need to open it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Secondly I would change the VLAN100 security level from 100 to a lower number.  As interfaces with the same level do not have to go thru an access-list.  Currently this breaks your PCI compliance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thirdly just to make sure I would configure a NAT exemption between the 2 VLAN interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&amp;gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Feb 2009 13:14:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-to-inside-network-from-second-vlan/m-p/1182054#M875854</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2009-02-25T13:14:46Z</dc:date>
    </item>
    <item>
      <title>Re: Access to inside network from second vlan</title>
      <link>https://community.cisco.com/t5/network-security/access-to-inside-network-from-second-vlan/m-p/1182055#M875856</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;E 0/5 is now active, lowered security level to 0 on VLAN 100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But I don't really understand the NAT excemption rule.  I want 10.100.10.1 to be able to access 10.71.180.136 (inside network) server.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Feb 2009 22:57:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-to-inside-network-from-second-vlan/m-p/1182055#M875856</guid>
      <dc:creator>michael.m.williams</dc:creator>
      <dc:date>2009-02-25T22:57:45Z</dc:date>
    </item>
    <item>
      <title>Re: Access to inside network from second vlan</title>
      <link>https://community.cisco.com/t5/network-security/access-to-inside-network-from-second-vlan/m-p/1182056#M875858</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK - personally I would have the security level to 50 - then I know&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My inside is 100 = totally trusted&lt;/P&gt;&lt;P&gt;My outside is 0 = totally un-trusted&lt;/P&gt;&lt;P&gt;My VLAN100 is 50 = can access the internet, but I need to write an acl for traffic originating in the VLAN100 to the inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You must look at your NAT - bu default all traffic passing from a lower interface to a higher and vice versa is natt'ed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I would have something likeP:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 w.w.w.w x.x.x.x&lt;/P&gt;&lt;P&gt;nat (VLAN100) 1 y.y.y.y z.z.z.z&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above will NAT all traffic to the internet using the outside IP address, then the nat exemption&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list no-nat permit ip w.w.w.w x.x.x.x y.y.y.y z.z.z.z&lt;/P&gt;&lt;P&gt;access-list no-nat-permit ip y.y.y.y z.z.z.z w.w.w.w x.x.x.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list no-nat&lt;/P&gt;&lt;P&gt;nat (VLAN100) 0 access-list no-nat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above tells the firewall not to nat when the source and destinatiobn match = everything else should be natt'ed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;w.w.w.w x.x.x.x = VLAN 71 IP subnet &amp;amp; mask&lt;/P&gt;&lt;P&gt;y.y.y.y z.z.z.z = VLAN100 IP subnet &amp;amp; mask&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then you need to allow access from server to server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list allow-server permit ip host 10.100.10.1 host 10.71.100.136&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group allow-server in interface VLAN100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&amp;gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Feb 2009 09:42:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-to-inside-network-from-second-vlan/m-p/1182056#M875858</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2009-02-26T09:42:57Z</dc:date>
    </item>
    <item>
      <title>Re: Access to inside network from second vlan</title>
      <link>https://community.cisco.com/t5/network-security/access-to-inside-network-from-second-vlan/m-p/1182057#M875860</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It would not allow me to enter &lt;/P&gt;&lt;P&gt;nat(VLAN100) 1 10.100.10.0 255.255.255.128&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Currently there is no nameif for the interface.  So I attempted to add on.  here is the error I got.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ERROR: This license does not allow configuring more than 2 interfaces with&lt;/P&gt;&lt;P&gt;nameif and without a "no forward" command on this interface or on 1 interface(s)&lt;/P&gt;&lt;P&gt;with nameif already configured.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do i need to upgrade the license first?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Feb 2009 15:16:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-to-inside-network-from-second-vlan/m-p/1182057#M875860</guid>
      <dc:creator>michael.m.williams</dc:creator>
      <dc:date>2009-02-27T15:16:07Z</dc:date>
    </item>
    <item>
      <title>Re: Access to inside network from second vlan</title>
      <link>https://community.cisco.com/t5/network-security/access-to-inside-network-from-second-vlan/m-p/1182058#M875861</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This error has occured due to a license limitation on ASA.  You need to obtain the Security Plus license in order to configure more VLANs as in routed mode.  Only three active VLANs can be configured with the Base license, and up to 20 active VLANs with the Security Plus license. You can create a third VLAN with the Base license, but this VLAN only has communication either to the outside or to the inside but not in both directions. If you need to have the communication in both directions, then you need to upgrade the license.  Also, if you use the Base license, allow this interface to be the third VLAN and limit it from initiating contact to one other VLAN with the hostname(config-if)# no forward interface vlan number command. Thus the third VLAN can be configured.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;go to:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/ef.html#wp1931294" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/ef.html#wp1931294&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for the "forward interface" command &amp;amp; explaination.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&amp;gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Feb 2009 15:34:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-to-inside-network-from-second-vlan/m-p/1182058#M875861</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2009-02-27T15:34:50Z</dc:date>
    </item>
    <item>
      <title>Re: Access to inside network from second vlan</title>
      <link>https://community.cisco.com/t5/network-security/access-to-inside-network-from-second-vlan/m-p/1182059#M875862</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think that you could just move the "outside" off VLAN 2 and into a specific interface - then you can have 2 vlans without having to upgrade!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Feb 2009 15:36:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-to-inside-network-from-second-vlan/m-p/1182059#M875862</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2009-02-27T15:36:13Z</dc:date>
    </item>
    <item>
      <title>Re: Access to inside network from second vlan</title>
      <link>https://community.cisco.com/t5/network-security/access-to-inside-network-from-second-vlan/m-p/1182060#M875863</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Actually just thinking about it another possible solution would be:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Move the inside interface into it's own interface.  Then create a sub-interface and tag it with a vlan id.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On your switch either make the physical port conneecting to the ASA a trunk port or.......have it as a normal switch port in the inside VLAN, then if your switch supports it use the AUX vlan for your DMZ.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&amp;gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Feb 2009 15:58:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-to-inside-network-from-second-vlan/m-p/1182060#M875863</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2009-02-27T15:58:51Z</dc:date>
    </item>
    <item>
      <title>Re: Access to inside network from second vlan</title>
      <link>https://community.cisco.com/t5/network-security/access-to-inside-network-from-second-vlan/m-p/1182061#M875864</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No VLAN 100 does not have to access outside interface, just talk to server on inside VLAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have configured everything for nat exemption and added no forward command to outside interface. (vlan 2).  I went ahead and confiured two test laptops on in vlan 71 (inside) 10.71.180.135 and one in VLAN 100, 10.100.10.114.   To check connectivity I pinged from inside ip to VLAN 100 on the ASA CLI and I am good, but can't ping from 10.100.10.114 ip to computer on inside interface or ping inside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;P&gt;  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Feb 2009 17:54:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-to-inside-network-from-second-vlan/m-p/1182061#M875864</guid>
      <dc:creator>michael.m.williams</dc:creator>
      <dc:date>2009-02-27T17:54:00Z</dc:date>
    </item>
    <item>
      <title>Re: Access to inside network from second vlan</title>
      <link>https://community.cisco.com/t5/network-security/access-to-inside-network-from-second-vlan/m-p/1182062#M875865</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK - firstly you have a config error:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list allow-server extended permit ip host 10.100.10.114 host 10.71.100.135&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;should read:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list allow-server extended permit ip host 10.100.10.114 host 10.71.180.135&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;secondly have you configured the default gateway on the laptops to the correct ASA interface IP address ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;post the output of&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"show access-list allow-server"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Feb 2009 19:07:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-to-inside-network-from-second-vlan/m-p/1182062#M875865</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2009-02-27T19:07:32Z</dc:date>
    </item>
    <item>
      <title>Re: Access to inside network from second vlan</title>
      <link>https://community.cisco.com/t5/network-security/access-to-inside-network-from-second-vlan/m-p/1182063#M875866</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Config error corrected.  Thanks for that. I can't change the default gateway for VLAN 100 because this is an existing network that has other servers on it.  10.100.100.1 provides services to the computers within that network and also needs to communicate with server within  VLAN 71 (PCI network).  The inside laptop is set up as DHCP and has the correct DFG.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes i can ping the 10.71.180.135 when i change the default gateway 10.100.10.114 to 10.100.10.120.  If there another way to reach the inside network from VLAN 100 without changing default gateway?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Feb 2009 19:22:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-to-inside-network-from-second-vlan/m-p/1182063#M875866</guid>
      <dc:creator>michael.m.williams</dc:creator>
      <dc:date>2009-02-27T19:22:59Z</dc:date>
    </item>
    <item>
      <title>Re: Access to inside network from second vlan</title>
      <link>https://community.cisco.com/t5/network-security/access-to-inside-network-from-second-vlan/m-p/1182064#M875867</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am confused - are you saying that you have a different DG in the VLAN100 subnet?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then the solution will be to configure a static route in the server that points the 10.71.180.0/24 or 10.71.180.135 host in it's routing table pointing towards the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&amp;gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Feb 2009 21:45:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-to-inside-network-from-second-vlan/m-p/1182064#M875867</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2009-02-27T21:45:36Z</dc:date>
    </item>
  </channel>
</rss>

